Government organisations are frequently at the forefront of cyber-attacks and are often under the close scrutiny of regulators. Because of the nature of the information they hold, there is also a huge risk from data leaks and the corresponding loss in trust from citizens as well as financial penalties that are imposed should a breach occur. Find out more how you can ensure that critical information is adequately and cost effectively protected at all times. Click to download!
For many years, organisations have noted that the network is the computer. With that, the network is the data, as data is the gold. Imagine if it occurred that 500 office chairs were stolen, with asset tags. Not really such a big deal, as they are insured. But if a few gigabytes of data are lost from an organisation that can often mean significant impact and consequences. Read more.
There’s an old saying that a ship is safe in the harbour, but that’s not what ships are for. The same can be said of enterprise data. If a company’s success is increasingly determined by its ability to act on information, a fundamental requirement of that success is the enablement of unfettered communications between co-workers, partners and clients. Read more.
Managing information in today’s business environment has become increasingly complex: Data leakage is a critical issue for CIOs. Companies are hitting the headlines for all the wrong reasons and human error is one of the biggest culprits. With many organisations focusing on inbound threats, there’s a genuine risk that vulnerability inside company walls will be overlooked. Read more.
As different technology trends create new challenges and complexity for all organisations, they now must address the threats that reside much closer to home. In this research paper, conducted by Loudhouse, we identify the extent to which internal security threats are affecting different organisations and, in turn, how these are being managed. Click to download!
The web is a highly interactive, sophisticated and increasingly mission-critical platform. As online collaboration has matured and become more and more integral to many people’s lives, companies are increasingly using such technologies to connect more effectively with their customers, suppliers and partners. This short guide outlines 10 simple steps to best practice in web security. Find out how to stay in-front of your competitors. Click to Download!
Information monitoring is a tricky subject. We all want to be able to trust others with data, but information theft and data leakage happen all too often, and organisations are asking themselves how much they should be monitoring the way company information is used. In this whitepaper, we look at why this is an issue and how should it be done? Find out more.
The rapidly expanding field of Information Governance, encompassing all aspects policies, processes and controls of the effective management of information within an organisation, has at its heart a requirement to understand the information that is travelling within it in order to adequately protect it. In this whitepaper, we look at the next generation of Data Loss Prevention solutions, and how they operate within a set governance framework.
Today, with increasing numbers of data breaches attributed to human error, finding a clear route to data protection can appear to be a daunting prospect. By focusing on content and not the threat, organisations can implement flexible policies that eliminate human error from the data protection headache. Read more.
For years, most companies have dealt with the evolving dynamics of data archiving by addressing an immediate need rather than building a long-term strategy. But over time, putting all information on costly storage is likely to be very expensive. This whitepaper explains why it’s time for organizations to start to strategically evaluate archive solutions for capabilities they need, both now and in the future. While no technology is future proof, an archiving solution can make you “future ready.”
Most Popular Reviews
- 1 Samsung Galaxy S8 phone: full, in-depth review
- 2 Ryzen 5 vs Intel Core i5 CPU Australian review
- 3 Mass Effect Andromeda review: One for the fans
- 4 LG G6 phone: full, in-depth review
- 5 Samsung Galaxy A5 2017 phone: Full, in-depth review
Join the PC World newsletter!
Latest News Articles
- WikiLeaks: CIA used bits of Carberp Trojan code for malware deployment
- Chinese hackers go after third-party IT suppliers to steal data
- Intel divests McAfee after rough marriage, will now secure hardware
- LastPass is scrambling to fix another serious vulnerability
- BlackBerry readies a more secure version of the Samsung Galaxy S7
PCW Evaluation Team
A smarter way to print for busy small business owners, combining speedy printing with scanning and copying, making it easier to produce high quality documents and images at a touch of a button.
I've had a multifunction printer in the office going on 10 years now. It was a neat bit of kit back in the day -- print, copy, scan, fax -- when printing over WiFi felt a bit like magic. It’s seen better days though and an upgrade’s well overdue. This HP OfficeJet Pro 8730 looks like it ticks all the same boxes: print, copy, scan, and fax. (Really? Does anyone fax anything any more? I guess it's good to know the facility’s there, just in case.) Printing over WiFi is more-or- less standard these days.
As a freelance writer who is always on the go, I like my technology to be both efficient and effective so I can do my job well. The HP OfficeJet Pro 8730 Inkjet Printer ticks all the boxes in terms of form factor, performance and user interface.
I’d happily recommend this touchscreen laptop and Windows 10 as a great way to get serious work done at a desk or on the road.
Ultimately, I think the Windows 10 environment is excellent for me as it caters for so many different uses. The inclusion of the Xbox app is also great for when you need some downtime too!
For me, the Xbox Play Anywhere is a great new feature as it allows you to play your current Xbox games with higher resolutions and better graphics without forking out extra cash for another copy. Although available titles are still scarce, but I’m sure it will grow in time.
- Samsung Galaxy S8 phone: full, in-depth review
- Ryzen 5 vs Intel Core i5 CPU Australian review
- Mass Effect Andromeda review: One for the fans
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- FTBusiness Process AnalystWA
- CCServer SOE EngineerACT
- CCJava Developer IntegrationQLD
- FTTelecommunications Provisioning LeadQLD
- TPTechnical Support Officer (Unix/Linux, Windows and Mac)VIC
- CCCRM DeveloperACT
- CCSenior Business AnalystNSW
- FTSecurity Engineer (IPS & Firewall exp essential) - Perm - IT Services - SydneyNSW
- FTProduct Manager - IoTNSW
- FTChief Security OfficerNSW
- CCSOE Business AnalystACT
- CCSoftware ManagerVIC
- TPProject ManagerQLD
- TPSenior Business AnalystVIC
- FTICT Sales Account ManagerQLD
- CCApplications Support/ DevOps EngineerQLD
- FTSenior Desktop Engineer - SCCM / AD / 2012 ServerNSW
- TPStrategic Business AnalystVIC
- FTTest AnalystNSW
- CCPMO AnalystVIC
- CCBusiness Implementation Manager - Wealth AdviceNSW
- FTSecurity Support Manager - Perth BasedNSW
- TPAV Design SpecialistNSW
- FTFront-end Developer (UX/UI)NSW
- FTSolution ArchitectVIC